xenops@2.0.25

Vulnerabilities

32 via 48 paths

Dependencies

95

Source

npm

Find, fix and prevent vulnerabilities in your code.

xenops@2.0.25
mssql@0.5.5
tedious@0.2.4
iconv-lite@0.4.2
sprintf@0.1.1
generic-pool@2.0.4
  • M
restify@2.7.0
assert-plus@0.1.5
backoff@2.3.0
  • M
bunyan@0.22.1
mv@0.0.5
dtrace-provider@0.2.8
csv@0.3.7
deep-equal@0.0.0
escape-regexp-component@1.0.2
formidable@1.0.14
  • M
http-signature@0.10.0
assert-plus@0.1.2
asn1@0.1.11
ctype@0.5.2
keep-alive-agent@0.0.1
dtrace-provider@0.2.8
lru-cache@2.3.1
  • L
mime@1.2.11
  • H
negotiator@0.3.0
  • M
node-uuid@1.4.1
once@1.3.0
  • H
  • M
qs@0.6.6
  • M
semver@2.2.1
spdy@1.19.3
  • M
tunnel-agent@0.4.0
verror@1.3.7
extsprintf@1.0.2
node-uuid@1.4.8
socket.io@0.9.19
socket.io-client@0.9.16
  • M
uglify-js@1.2.5
  • H
  • M
ws@0.4.32
commander@2.1.0
nan@1.0.0
tinycolor@0.0.1
options@0.0.6
xmlhttprequest@1.4.2
active-x-obfuscator@0.0.1
zeparser@0.0.5
policyfile@0.0.4
base64id@0.1.0
redis@0.7.3
restify-validator@0.3.1
  • H
  • M
validator@1.1.3
util@0.10.4
inherits@2.0.3
winston@0.7.3
async@0.2.10
colors@0.6.2
cycle@1.0.3
eyes@0.1.8
pkginfo@0.3.1
  • M
request@2.16.6
form-data@0.0.10
combined-stream@0.0.7
delayed-stream@0.0.5
  • L
mime@1.2.11
async@0.2.10
  • L
mime@1.2.11
  • L
hawk@0.10.2
  • M
hoek@0.7.6
boom@0.3.8
  • M
hoek@0.7.6
cryptiles@0.1.3
boom@0.3.8
  • M
hoek@0.7.6
sntp@0.1.4
  • M
hoek@0.7.6
node-uuid@1.4.8
aws-sign@0.2.1
oauth-sign@0.2.0
forever-agent@0.2.0
  • M
tunnel-agent@0.2.0
json-stringify-safe@3.0.0
  • H
  • M
qs@0.5.6
cookie-jar@0.2.0
stack-trace@0.0.10
mkdirp@0.5.5
minimist@1.2.5
ncp@0.5.1
  • H
  • M
ejs@1.0.0
mysql@2.18.1
bignumber.js@9.0.0
readable-stream@2.3.7
core-util-is@1.0.2
inherits@2.0.4
isarray@1.0.0
process-nextick-args@2.0.1
safe-buffer@5.1.2
string_decoder@1.1.1
safe-buffer@5.1.2
util-deprecate@1.0.2
safe-buffer@5.1.2
sqlstring@2.3.1
orm@2.1.30
enforce@0.1.6
sql-query@0.1.26
sql-ddl-sync@0.3.11
  • H
  • M
lodash@2.4.1
hat@0.0.3
  • H
  • M
lodash@2.4.1
path-is-absolute@1.0.0